Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Master's Theses and Project Reports

Discipline
Keyword
Publication Year

Articles 1 - 30 of 42

Full-Text Articles in Other Computer Engineering

Polycommit: Building Better Habits Through Gamification, Elliot Fiske Jun 2018

Polycommit: Building Better Habits Through Gamification, Elliot Fiske

Master's Theses and Project Reports

Computer-assisted learning is older than Turing machines, and constantly evolves as technology improves. While some teachers are resistant to using technology in the classroom, “e-learning” techniques are becoming more common in almost every school, from K-12 to universities. As technology becomes more widespread, it becomes crucial to examine the various methodologies of computer-assisted learning and find the techniques that are most effective.

This paper explores the effectiveness of one such methodology, spaced repetition. This technique applies to homework assignments available to students online. We include an exploration of several existing apps that use this technique, and introduce our own novel ...


Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


Mastering The Game Of Gomoku Without Human Knowledge, Yuan Wang Jun 2018

Mastering The Game Of Gomoku Without Human Knowledge, Yuan Wang

Master's Theses and Project Reports

Gomoku, also called Five in a row, is one of the earliest checkerboard games invented by humans. For a long time, it has brought countless pleasures to us. We humans, as players, also created a lot of skills in playing it. Scientists normalize and enter these skills into the computer so that the computer knows how to play Gomoku. However, the computer just plays following the pre-entered skills, it doesn’t know how to develop these skills by itself. Inspired by Google’s AlphaGo Zero, in this thesis, by combining the technologies of Monte Carlo Tree Search, Deep Neural Networks ...


Leave The Features: Take The Cannoli, Jonathan Joseph Catanio Jun 2018

Leave The Features: Take The Cannoli, Jonathan Joseph Catanio

Master's Theses and Project Reports

Programming languages like Python, JavaScript, and Ruby are becoming increasingly popular due to their dynamic capabilities. These languages are often much easier to learn than other, statically type checked, languages such as C++ or Rust. Unfortunately, these dynamic languages come at the cost of losing compile-time optimizations. Python is arguably the most popular language for data scientists and researchers in the artificial intelligence and machine learning communities. As this research becomes increasingly popular, and the problems these researchers face become increasingly computationally expensive, questions are being raised about the performance of languages like Python. Language features found in Python, more ...


Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson Jun 2018

Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson

Master's Theses and Project Reports

Static analysis tools can aid programmers by reporting potential programming mistakes prior to the execution of a program. Funqual is a static analysis tool that reads C++17 code ``in the wild'' and checks that the function call graph follows a set of rules which can be defined by the user. This sort of analysis can help the programmer to avoid errors such as accidentally calling blocking functions in time-sensitive contexts or accidentally allocating memory in heap-sensitive environments. To accomplish this, we create a type system whereby functions can be given user-defined type qualifiers and where users can define their ...


Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard Jun 2018

Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard

Master's Theses and Project Reports

Autonomous vehicle navigation is a complex and challenging task. Land and aerial vehicles often use highly accurate GPS sensors to localize themselves in their environments. These sensors are ineffective in underwater environments due to signal attenuation. Autonomous underwater vehicles utilize one or more of the following approaches for successful localization and navigation: inertial/dead-reckoning, acoustic signals, and geophysical data. This thesis examines autonomous localization in a simulated environment for an OpenROV Underwater Drone using a Kalman Filter. This filter performs state estimation for a dead reckoning system exhibiting an additive error in location measurements. We evaluate the accuracy of this ...


Predicting The Vote Using Legislative Speech, Aditya Budhwar Mar 2018

Predicting The Vote Using Legislative Speech, Aditya Budhwar

Master's Theses and Project Reports

As most dedicated observers of voting bodies like the U.S. Supreme Court can attest, it is possible to guess vote outcomes based on statements made during deliberations or questioning by the voting members. In most forms of representative democracy, citizens can actively petition or lobby their representatives, and that often means understanding their intentions to vote for or against an issue of interest. In some U.S. state legislators, professional lobby groups and dedicated press members are highly informed and engaged, but the process is basically closed to ordinary citizens because they do not have enough background and familiarity ...


Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt, Christopher Allen Hunt Mar 2017

Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt, Christopher Allen Hunt

Master's Theses and Project Reports

Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical ...


Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly Mar 2017

Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly

Master's Theses and Project Reports

Code clones are duplicate fragments of code that perform the same task. As software code bases increase in size, the number of code clones also tends to increase. These code clones, possibly created through copy-and-paste methods or unintentional duplication of effort, increase maintenance cost over the lifespan of the software. Code clone detection tools exist to identify clones where a human search would prove unfeasible, however the quality of the clones found may vary. I demonstrate that the performance of such tools can be improved by normalizing the source code before usage. I developed Normalizer, a tool to transform C ...


Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney Nov 2016

Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney

Master's Theses and Project Reports

The convenience of mobile applications combined with the efficiency and effectiveness provided by technology has contributed to an increased interest in mobile applications. Local groups and non-profit organizations often utilize outdated, manual processes and don’t have the resources or time to look into improving these systems. For Cal Poly students and other members of the community, this means there is an opportunity to apply technical skills and school projects to address these inefficiencies. This work explores whether a better system can be developed to provide the functionality of the existing system and enhance the experience of users through technology ...


Inducing Emotional Response In Interactive Media, Keenan M. Reimer Aug 2016

Inducing Emotional Response In Interactive Media, Keenan M. Reimer

Master's Theses and Project Reports

Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects ...


Polyfs Visualizer, Paul Martin Fallon Jun 2016

Polyfs Visualizer, Paul Martin Fallon

Master's Theses and Project Reports

One of the most important operating system topics, file systems, control how we store and access data and form a key point in a computer scientists understanding of the underlying mechanisms of a computer. However, file systems, with their abstract concepts and lack of concrete learning aids, is a confusing subjects for students. Historically at Cal Poly, the CPE 453 Introduction to Operating Systems has been on of the most failed classes in the computing majors, leading to the need for better teaching and learning tools. Tools allowing students to gain concrete examples of abstract concepts could be used to ...


The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky Jun 2016

The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky

Master's Theses and Project Reports

Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.

This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time ...


Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan Jun 2016

Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan

Master's Theses and Project Reports

Virtual reality is currently in the spotlight, attracting intense scrutiny by the press, technology companies, and consumers. After twenty years of dormancy, the technology has experienced a renaissance following advancements in both hardware and software. Most of these developments, and thus press attention, have been centered on entertainment. However, if the technology is going to continue to grow, it must be useful in a wide variety of situations. This paper explores the effectiveness of visualizing data in virtual reality in comparison to traditional presentations.

In this thesis, we present an approach to displaying data in a virtual reality environment. We ...


Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet Jun 2016

Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet

Master's Theses and Project Reports

Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration ...


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses and Project Reports

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being ...


Future Of Payment Platforms, Salim Benjamin Youssefzadeh Jun 2014

Future Of Payment Platforms, Salim Benjamin Youssefzadeh

Master's Theses and Project Reports

With the vast increase in smartphones, there have been an increasing number of opportunities growing in the app industry. One in particular is the way we deal with money. There are huge overheads in the current payment systems around the world particularly in the United States, many of which include large transaction fees. Many new businesses have grown to solve these inefficiencies and create a new platform that provides a new user experience, security, and convenience among many other things. However, many of these platforms are still centralized, making them more susceptible to attacks. This thesis goes over the various ...


Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed-Signal Chips, David Marusiak Jun 2014

Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed-Signal Chips, David Marusiak

Master's Theses and Project Reports

Many modern digital systems use forms of CMOS logical implementation due to the straight forward design nature of CMOS logic and minimal device area since CMOS uses fewer transistors than other logic families. To achieve high-performance requirements in mixed-signal chip development and quiet, noiseless circuitry, this thesis provides an alternative toCMOSin the form of MOS Current Mode Logic (MCML). MCML dissipates constant current and does not produce noise during value changing in a circuit CMOS circuits do. CMOS logical networks switch during clock ticks and with every device switching, noise is created on the supply and ground to deal with ...


A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes Jun 2014

A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes

Master's Theses and Project Reports

Orchard fruits and vegetable crops are vulnerable to wild birds and animals. These wild birds and animals can cause critical damage to the produce. Traditional methods of scaring away birds such as scarecrows are not long-term solutions but short-term solutions. This is a huge problem especially near areas like San Luis Obispo where there are vineyards. Bird damage can be as high as 50% for grapes being grown in vineyards. The total estimated revenue lost annually in the 10 counties in California due to bird and rodent damage to 22 selected crops ranged from $168 million to $504 million (in ...


A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns Jun 2014

A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns

Master's Theses and Project Reports

Studies show that smartphone thefts are a significant problem in the United States. [30] With many upcoming proposals to decrease the theft-rate of such devices, investigating new techniques for preventing smartphone theft is an important area of research. The prevalence of new biometric identification techniques for smartphones has led some researchers to propose biometric anti-theft measures for such devices, similar to the current fingerprint authentication system for iOS. Gait identification, a relatively recent field of study, seems to be a good fit for anti-theft because of the non-intrusive nature of passive pattern recognition in walking. In this paper, we reproduce ...


Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson Ms Jun 2014

Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson Ms

Master's Theses and Project Reports

News space is a relatively nebulous term that describes the general discourse concerning events that affect the populace. Past research has focused on qualitatively analyzing news space in an attempt to answer big questions about how the populace relates to the news and how they respond to it. We want to ask when do stories begin? What stories stand out among the noise? In order to answer the big questions about news space, we need to track the course of individual stories in the news. By analyzing the specific articles that comprise stories, we can synthesize the information gained from ...


Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling Jun 2014

Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling

Master's Theses and Project Reports

Recent growth in the commercial availability of consumer grade 3D user interface devices like the Microsoft Kinect and the Oculus Rift, coupled with the broad availability of high performance 3D graphics hardware, has put high quality 3D user interfaces firmly within the reach of consumer markets for the first time ever. However, these devices require custom integration with every application which wishes to use them, seriously limiting application support, and there is no established mechanism for multiple applications to use the same 3D interface hardware simultaneously. This thesis proposes that these problems can be solved in the same way that ...


Parsing Of Natural Language Requirements, Jamie L. Patterson Dec 2013

Parsing Of Natural Language Requirements, Jamie L. Patterson

Master's Theses and Project Reports

The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.


Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella Dec 2013

Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella

Master's Theses and Project Reports

This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.

The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface ...


A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin Dec 2013

A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin

Master's Theses and Project Reports

Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.

Despite this rise in availability and popularity, development for these devices ...


Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia Dec 2013

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses and Project Reports

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict ...


Smarter Neat Nets, Ryan Swords Dehaven Aug 2013

Smarter Neat Nets, Ryan Swords Dehaven

Master's Theses and Project Reports

This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the ...


Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky Jun 2013

Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky

Master's Theses and Project Reports

Culling out non-visible portions of 3D scenes is important for rendering large complex worlds at an interactive frame rate. Past 3D engines used static prebaked visibility data which was generated using complex algorithms. Hardware Occlusion Queries are a modern feature that allows engines to determine if objects are invisible on the fly. This allows for fully dynamic destructible and editable environments as opposed to static prebaked environments of the past. This paper presents an algorithm that uses Hardware Occlusion Queries to cull fully dynamic scenes in real-time. This algorithm is relatively simple in comparison to other real-time occlusion culling techniques ...


Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White Jun 2013

Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White

Master's Theses and Project Reports

Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.

Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder ...


Amaethon - A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero Dec 2012

Amaethon - A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero

Master's Theses and Project Reports

Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite ...